okta

IDP initiated SSO fails with OKTA as an IDP in Azure

怎甘沉沦 提交于 2021-02-11 13:37:18
问题 We have configured OKTA as an IDP in Azure AD. While testing the IDP(OKTA) authentication flow, it throws error. Configured Okta & Azure AD using below microsoft link as reference. https://docs.microsoft.com/en-us/azure/active-directory/b2b/direct-federation What we did so far? Registered company "example.com" in OKTA. Created a custom SAML app in OKTA to export the OKTA IDP metadata Configured the app SSO settings as above reference link Imported OKTA metadata as external IDP in AzureAD

AuthenticateResult.Succeeded is false with Okta and Sustainsys.SAML2

烈酒焚心 提交于 2021-02-02 03:41:39
问题 I have a .Net Core 2 application which leverages Sustainsys.Saml2.AspNetCor2 (2.7.0). The front end is an Angular application. The SAML approach I'm taking is based on, and very similar to, the approach taken in this reference implementation: https://github.com/hmacat/Saml2WebAPIAndAngularSpaExample *Everything works fine with the test IDP (https://stubidp.sustainsys.com). But when we try to integrate with Okta, the AuthenticateResult.Succeeded property in the callback method (see below) is

AuthenticateResult.Succeeded is false with Okta and Sustainsys.SAML2

回眸只為那壹抹淺笑 提交于 2021-02-02 03:41:26
问题 I have a .Net Core 2 application which leverages Sustainsys.Saml2.AspNetCor2 (2.7.0). The front end is an Angular application. The SAML approach I'm taking is based on, and very similar to, the approach taken in this reference implementation: https://github.com/hmacat/Saml2WebAPIAndAngularSpaExample *Everything works fine with the test IDP (https://stubidp.sustainsys.com). But when we try to integrate with Okta, the AuthenticateResult.Succeeded property in the callback method (see below) is

How to log out using PKCE authorization flow?

不问归期 提交于 2021-01-29 08:40:37
问题 If I have an app and an api . If the app logs in through authorization server and sends the authorization: Bearer xxx header with each request, the api can verify the token locally. When the user logs out (through the auth server), but the token has not yet expired if someone retrieves this token they will be able to make requests (if the authentication of the token is done locally on the server), is that correct? If thats the case, why is such a logout flow considered secure? Edit:

Redirecting user to default page after login in ASP.NET Core using Okta

坚强是说给别人听的谎言 提交于 2021-01-28 13:42:38
问题 I am using Okta for authentication in my ASP.NET Core application. After login, I would like to redirect the user to a different page, but I cannot find where to configure this. In ConfigureServices: services.AddAuthentication(sharedOptions => { sharedOptions.DefaultAuthenticateScheme = CookieAuthenticationDefaults.AuthenticationScheme; sharedOptions.DefaultSignInScheme = CookieAuthenticationDefaults.AuthenticationScheme; sharedOptions.DefaultChallengeScheme = OpenIdConnectDefaults

Spring Security Saml configuration error with OKTA

跟風遠走 提交于 2021-01-27 14:47:37
问题 Might be the question is already answered before but I cant find any answer for my problem so I ask you my question. I am trying to implement SAML2 based SSO with OKTA. For that purpose I created a dev account at oktapreviw. I downloaded spring securty saml2 example at this link http://projects.spring.io/spring-security-saml/#quick-start and by using this link https://docs.spring.io/spring-security-saml/docs/1.0.x/reference/html/chapter-idp-guide.html#d5e1816 I adopted my configuration and

How to downgrade python version from 3.8 to 3.7 (mac)

老子叫甜甜 提交于 2021-01-17 04:22:46
问题 I'm using Python & okta-aws tools and in order to fetch correct credentials on aws I need to run okta-aws init. But got an error message of Could not read roles from Okta and the system prompted that "Your Pipfile requires python_version 3.7, but you are using 3.8.3 (/usr/local/Cellar/o/1.1.4/l/.venv/bin/python) . I've tried to search all the Pipfiles on the mac and it seems that the Pipflie under my ~/Pipfile and /usr/local/Cellar/python@3.8/3.8.3_2/libexec/bin/Pipfile all have the same